2017-08-02 17:48:51 +01:00
|
|
|
#! @shell@
|
2017-10-16 22:31:44 +01:00
|
|
|
set -eu -o pipefail +o posix
|
2017-08-02 17:48:51 +01:00
|
|
|
shopt -s nullglob
|
|
|
|
|
2017-09-20 16:35:58 +01:00
|
|
|
if (( "${NIX_DEBUG:-0}" >= 7 )); then
|
|
|
|
set -x
|
|
|
|
fi
|
|
|
|
|
2016-01-25 08:54:10 +00:00
|
|
|
path_backup="$PATH"
|
2017-08-02 17:48:51 +01:00
|
|
|
|
|
|
|
# That @-vars are substituted separately from bash evaluation makes
|
|
|
|
# shellcheck think this, and others like it, are useless conditionals.
|
|
|
|
# shellcheck disable=SC2157
|
|
|
|
if [[ -n "@coreutils_bin@" && -n "@gnugrep_bin@" ]]; then
|
|
|
|
PATH="@coreutils_bin@/bin:@gnugrep_bin@/bin"
|
2015-12-17 22:02:40 +00:00
|
|
|
fi
|
2008-06-26 12:07:46 +01:00
|
|
|
|
2018-05-07 18:15:34 +01:00
|
|
|
source @out@/nix-support/utils.bash
|
2017-08-31 19:43:09 +01:00
|
|
|
|
2008-06-26 12:07:46 +01:00
|
|
|
|
2016-03-14 03:52:12 +00:00
|
|
|
# Parse command line options and set several variables.
|
|
|
|
# For instance, figure out if linker flags should be passed.
|
|
|
|
# GCC prints annoying warnings when they are not needed.
|
2008-06-26 12:07:46 +01:00
|
|
|
dontLink=0
|
|
|
|
nonFlagArgs=0
|
2019-08-04 01:57:49 +01:00
|
|
|
cc1=0
|
2017-08-02 17:48:51 +01:00
|
|
|
# shellcheck disable=SC2193
|
2021-05-02 19:03:51 +01:00
|
|
|
[[ "@prog@" = *++ ]] && isCxx=1 || isCxx=0
|
|
|
|
cxxInclude=1
|
2021-05-02 19:07:00 +01:00
|
|
|
cxxLibrary=1
|
2020-07-01 21:55:06 +01:00
|
|
|
cInclude=1
|
2008-06-26 12:07:46 +01:00
|
|
|
|
2016-10-30 13:41:41 +00:00
|
|
|
expandResponseParams "$@"
|
2021-05-22 12:55:47 +01:00
|
|
|
linkType=$(checkLinkType "$@")
|
|
|
|
|
2017-08-02 17:48:51 +01:00
|
|
|
declare -i n=0
|
|
|
|
nParams=${#params[@]}
|
2017-08-14 19:34:12 +01:00
|
|
|
while (( "$n" < "$nParams" )); do
|
2016-03-14 03:52:12 +00:00
|
|
|
p=${params[n]}
|
2017-08-03 20:34:23 +01:00
|
|
|
p2=${params[n+1]:-} # handle `p` being last one
|
2016-03-14 03:52:12 +00:00
|
|
|
if [ "$p" = -c ]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
dontLink=1
|
2016-03-14 03:52:12 +00:00
|
|
|
elif [ "$p" = -S ]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
dontLink=1
|
2016-03-14 03:52:12 +00:00
|
|
|
elif [ "$p" = -E ]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
dontLink=1
|
2016-03-14 03:52:12 +00:00
|
|
|
elif [ "$p" = -E ]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
dontLink=1
|
2016-03-14 03:52:12 +00:00
|
|
|
elif [ "$p" = -M ]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
dontLink=1
|
2016-03-14 03:52:12 +00:00
|
|
|
elif [ "$p" = -MM ]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
dontLink=1
|
2016-03-14 03:52:12 +00:00
|
|
|
elif [[ "$p" = -x && "$p2" = *-header ]]; then
|
2010-01-16 21:26:10 +00:00
|
|
|
dontLink=1
|
2021-05-02 19:03:51 +01:00
|
|
|
elif [[ "$p" = -x && "$p2" = c++* && "$isCxx" = 0 ]]; then
|
|
|
|
isCxx=1
|
2016-03-14 03:52:12 +00:00
|
|
|
elif [ "$p" = -nostdlib ]; then
|
2021-05-02 19:07:00 +01:00
|
|
|
cxxLibrary=0
|
2016-08-16 09:40:31 +01:00
|
|
|
elif [ "$p" = -nostdinc ]; then
|
2020-07-01 21:55:06 +01:00
|
|
|
cInclude=0
|
2021-05-02 19:03:51 +01:00
|
|
|
cxxInclude=0
|
2016-08-16 09:40:31 +01:00
|
|
|
elif [ "$p" = -nostdinc++ ]; then
|
2021-05-02 19:03:51 +01:00
|
|
|
cxxInclude=0
|
2017-11-22 21:29:57 +00:00
|
|
|
elif [[ "$p" != -?* ]]; then
|
|
|
|
# A dash alone signifies standard input; it is not a flag
|
2008-06-26 12:07:46 +01:00
|
|
|
nonFlagArgs=1
|
2019-08-04 01:57:49 +01:00
|
|
|
elif [ "$p" = -cc1 ]; then
|
|
|
|
cc1=1
|
2008-06-26 12:07:46 +01:00
|
|
|
fi
|
2017-08-02 17:48:51 +01:00
|
|
|
n+=1
|
2008-06-26 12:07:46 +01:00
|
|
|
done
|
|
|
|
|
|
|
|
# If we pass a flag like -Wl, then gcc will call the linker unless it
|
|
|
|
# can figure out that it has to do something else (e.g., because of a
|
|
|
|
# "-c" flag). So if no non-flag arguments are given, don't pass any
|
|
|
|
# linker flags. This catches cases like "gcc" (should just print
|
|
|
|
# "gcc: no input files") and "gcc -v" (should print the version).
|
2014-10-10 13:25:23 +01:00
|
|
|
if [ "$nonFlagArgs" = 0 ]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
dontLink=1
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Optionally filter out paths not refering to the store.
|
2017-08-03 20:34:23 +01:00
|
|
|
if [[ "${NIX_ENFORCE_PURITY:-}" = 1 && -n "$NIX_STORE" ]]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
rest=()
|
2017-08-02 17:48:51 +01:00
|
|
|
nParams=${#params[@]}
|
|
|
|
declare -i n=0
|
2017-08-14 19:34:12 +01:00
|
|
|
while (( "$n" < "$nParams" )); do
|
2008-06-26 12:07:46 +01:00
|
|
|
p=${params[n]}
|
2017-08-03 20:34:23 +01:00
|
|
|
p2=${params[n+1]:-} # handle `p` being last one
|
2014-10-10 13:25:23 +01:00
|
|
|
if [ "${p:0:3}" = -L/ ] && badPath "${p:2}"; then
|
2017-08-02 17:48:51 +01:00
|
|
|
skip "${p:2}"
|
2014-10-10 13:25:23 +01:00
|
|
|
elif [ "$p" = -L ] && badPath "$p2"; then
|
2017-08-02 17:48:51 +01:00
|
|
|
n+=1; skip "$p2"
|
2014-10-10 13:25:23 +01:00
|
|
|
elif [ "${p:0:3}" = -I/ ] && badPath "${p:2}"; then
|
2017-08-02 17:48:51 +01:00
|
|
|
skip "${p:2}"
|
2014-10-10 13:25:23 +01:00
|
|
|
elif [ "$p" = -I ] && badPath "$p2"; then
|
2017-08-02 17:48:51 +01:00
|
|
|
n+=1; skip "$p2"
|
2014-10-10 13:25:23 +01:00
|
|
|
elif [ "$p" = -isystem ] && badPath "$p2"; then
|
2017-08-02 17:48:51 +01:00
|
|
|
n+=1; skip "$p2"
|
2008-06-26 12:07:46 +01:00
|
|
|
else
|
2016-03-24 18:12:48 +00:00
|
|
|
rest+=("$p")
|
2008-06-26 12:07:46 +01:00
|
|
|
fi
|
2017-08-02 17:48:51 +01:00
|
|
|
n+=1
|
2008-06-26 12:07:46 +01:00
|
|
|
done
|
2017-08-14 19:34:12 +01:00
|
|
|
# Old bash empty array hack
|
|
|
|
params=(${rest+"${rest[@]}"})
|
2008-06-26 12:07:46 +01:00
|
|
|
fi
|
|
|
|
|
2020-07-01 21:55:06 +01:00
|
|
|
# Flirting with a layer violation here.
|
|
|
|
if [ -z "${NIX_BINTOOLS_WRAPPER_FLAGS_SET_@suffixSalt@:-}" ]; then
|
|
|
|
source @bintools@/nix-support/add-flags.sh
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Put this one second so libc ldflags take priority.
|
|
|
|
if [ -z "${NIX_CC_WRAPPER_FLAGS_SET_@suffixSalt@:-}" ]; then
|
|
|
|
source @out@/nix-support/add-flags.sh
|
|
|
|
fi
|
2016-03-15 16:35:07 +00:00
|
|
|
|
|
|
|
# Clear march/mtune=native -- they bring impurity.
|
2020-04-28 05:08:48 +01:00
|
|
|
if [ "$NIX_ENFORCE_NO_NATIVE_@suffixSalt@" = 1 ]; then
|
2016-03-15 16:35:07 +00:00
|
|
|
rest=()
|
2017-08-14 19:34:12 +01:00
|
|
|
# Old bash empty array hack
|
|
|
|
for p in ${params+"${params[@]}"}; do
|
2017-08-02 17:48:51 +01:00
|
|
|
if [[ "$p" = -m*=native ]]; then
|
|
|
|
skip "$p"
|
2016-03-15 16:35:07 +00:00
|
|
|
else
|
2017-08-02 17:48:51 +01:00
|
|
|
rest+=("$p")
|
2016-03-15 16:35:07 +00:00
|
|
|
fi
|
|
|
|
done
|
2017-08-14 19:34:12 +01:00
|
|
|
# Old bash empty array hack
|
|
|
|
params=(${rest+"${rest[@]}"})
|
2016-03-15 16:35:07 +00:00
|
|
|
fi
|
|
|
|
|
2021-05-02 19:03:51 +01:00
|
|
|
if [[ "$isCxx" = 1 ]]; then
|
|
|
|
if [[ "$cxxInclude" = 1 ]]; then
|
2021-05-02 19:00:37 +01:00
|
|
|
NIX_CFLAGS_COMPILE_@suffixSalt@+=" $NIX_CXXSTDLIB_COMPILE_@suffixSalt@"
|
|
|
|
fi
|
2021-05-02 19:07:00 +01:00
|
|
|
if [[ "$cxxLibrary" = 1 ]]; then
|
|
|
|
NIX_CFLAGS_LINK_@suffixSalt@+=" $NIX_CXXSTDLIB_LINK_@suffixSalt@"
|
|
|
|
fi
|
2015-02-08 18:36:13 +00:00
|
|
|
fi
|
|
|
|
|
2016-02-26 17:38:15 +00:00
|
|
|
source @out@/nix-support/add-hardening.sh
|
|
|
|
|
2008-06-26 12:07:46 +01:00
|
|
|
# Add the flags for the C compiler proper.
|
2020-04-28 05:08:48 +01:00
|
|
|
extraAfter=($NIX_CFLAGS_COMPILE_@suffixSalt@)
|
|
|
|
extraBefore=(${hardeningCFlags[@]+"${hardeningCFlags[@]}"} $NIX_CFLAGS_COMPILE_BEFORE_@suffixSalt@)
|
2008-06-26 12:07:46 +01:00
|
|
|
|
2014-10-10 13:25:23 +01:00
|
|
|
if [ "$dontLink" != 1 ]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
|
|
|
|
# Add the flags that should only be passed to the compiler when
|
|
|
|
# linking.
|
2021-05-22 12:55:47 +01:00
|
|
|
extraAfter+=($(filterRpathFlags "$linkType" $NIX_CFLAGS_LINK_@suffixSalt@))
|
2008-06-26 12:07:46 +01:00
|
|
|
|
|
|
|
# Add the flags that should be passed to the linker (and prevent
|
2020-04-28 05:08:48 +01:00
|
|
|
# `ld-wrapper' from adding NIX_LDFLAGS_@suffixSalt@ again).
|
2021-05-22 12:55:47 +01:00
|
|
|
for i in $(filterRpathFlags "$linkType" $NIX_LDFLAGS_BEFORE_@suffixSalt@); do
|
2017-08-02 17:48:51 +01:00
|
|
|
extraBefore+=("-Wl,$i")
|
2008-06-26 12:07:46 +01:00
|
|
|
done
|
2021-05-22 12:55:47 +01:00
|
|
|
if [[ "$linkType" == dynamic && -n "$NIX_DYNAMIC_LINKER_@suffixSalt@" ]]; then
|
2020-12-25 20:52:42 +00:00
|
|
|
extraBefore+=("-Wl,-dynamic-linker=$NIX_DYNAMIC_LINKER_@suffixSalt@")
|
|
|
|
fi
|
2021-05-22 12:55:47 +01:00
|
|
|
for i in $(filterRpathFlags "$linkType" $NIX_LDFLAGS_@suffixSalt@); do
|
2014-10-10 13:25:23 +01:00
|
|
|
if [ "${i:0:3}" = -L/ ]; then
|
|
|
|
extraAfter+=("$i")
|
|
|
|
else
|
|
|
|
extraAfter+=("-Wl,$i")
|
|
|
|
fi
|
2008-06-26 12:07:46 +01:00
|
|
|
done
|
2021-05-22 12:55:47 +01:00
|
|
|
export NIX_LINK_TYPE_@suffixSalt@=$linkType
|
2008-06-26 12:07:46 +01:00
|
|
|
fi
|
|
|
|
|
|
|
|
# As a very special hack, if the arguments are just `-v', then don't
|
|
|
|
# add anything. This is to prevent `gcc -v' (which normally prints
|
|
|
|
# out the version number and returns exit code 0) from printing out
|
|
|
|
# `No input files specified' and returning exit code 1.
|
2014-10-10 13:25:23 +01:00
|
|
|
if [ "$*" = -v ]; then
|
2008-06-26 12:07:46 +01:00
|
|
|
extraAfter=()
|
|
|
|
extraBefore=()
|
2014-10-10 13:25:23 +01:00
|
|
|
fi
|
2008-06-26 12:07:46 +01:00
|
|
|
|
2019-08-04 01:57:49 +01:00
|
|
|
# clang's -cc1 mode is not compatible with most options
|
|
|
|
# that we would pass. Rather than trying to pass only
|
|
|
|
# options that would work, let's just remove all of them.
|
|
|
|
if [ "$cc1" = 1 ]; then
|
|
|
|
extraAfter=()
|
|
|
|
extraBefore=()
|
|
|
|
fi
|
|
|
|
|
2008-06-26 12:07:46 +01:00
|
|
|
# Optionally print debug info.
|
2017-09-20 00:10:49 +01:00
|
|
|
if (( "${NIX_DEBUG:-0}" >= 1 )); then
|
2017-08-14 19:34:12 +01:00
|
|
|
# Old bash workaround, see ld-wrapper for explanation.
|
2017-08-02 17:48:51 +01:00
|
|
|
echo "extra flags before to @prog@:" >&2
|
2017-08-14 19:34:12 +01:00
|
|
|
printf " %q\n" ${extraBefore+"${extraBefore[@]}"} >&2
|
2017-08-02 17:48:51 +01:00
|
|
|
echo "original flags to @prog@:" >&2
|
2017-08-14 19:34:12 +01:00
|
|
|
printf " %q\n" ${params+"${params[@]}"} >&2
|
2017-08-02 17:48:51 +01:00
|
|
|
echo "extra flags after to @prog@:" >&2
|
2017-08-14 19:34:12 +01:00
|
|
|
printf " %q\n" ${extraAfter+"${extraAfter[@]}"} >&2
|
2008-06-26 12:07:46 +01:00
|
|
|
fi
|
|
|
|
|
2016-01-25 08:54:10 +00:00
|
|
|
PATH="$path_backup"
|
2017-08-14 19:34:12 +01:00
|
|
|
# Old bash workaround, see above.
|
2021-02-09 01:46:47 +00:00
|
|
|
|
|
|
|
if (( "${NIX_CC_USE_RESPONSE_FILE:-@use_response_file_by_default@}" >= 1 )); then
|
2021-03-09 05:01:34 +00:00
|
|
|
exec @prog@ @<(printf "%q\n" \
|
2021-02-09 01:46:47 +00:00
|
|
|
${extraBefore+"${extraBefore[@]}"} \
|
|
|
|
${params+"${params[@]}"} \
|
2021-03-09 05:01:34 +00:00
|
|
|
${extraAfter+"${extraAfter[@]}"})
|
2021-02-09 01:46:47 +00:00
|
|
|
else
|
|
|
|
exec @prog@ \
|
|
|
|
${extraBefore+"${extraBefore[@]}"} \
|
|
|
|
${params+"${params[@]}"} \
|
|
|
|
${extraAfter+"${extraAfter[@]}"}
|
|
|
|
fi
|